GPO abuse

  • There is a GPO abuse on the north domain

  • To abuse GPO we will use the project created by Hackndo : pyGPOAbuse

  • The github readme file say : “It will create an immediate scheduled task as SYSTEM on the remote computer for computer GPO, or as logged in user for user GPO.”

We get the id from bloodhound and launch the exploit with :

Now let’s try to get a powershell reverseshell

Catch the Shell - this needs to be done from the Lab Parrot OS VM.

And a few moments later we get the powershell reverseshell

Last updated